ID UBUNTU_USN-885-1.NASL Type nessus Reporter Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
It was discovered that the Transmission web interface was vulnerable
to cross-site request forgery (CSRF) attacks. If a user were tricked
into opening a specially crafted web page in a browser while
Transmission was running, an attacker could trigger commands in
Transmission. This issue affected Ubuntu 9.04. (CVE-2009-1757)
Dan Rosenberg discovered that Transmission did not properly perform
input validation when processing torrent files. If a user were tricked
into opening a crafted torrent file, an attacker could overwrite files
via directory traversal. (CVE-2010-0012).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-885-1. The text
# itself is copyright (C) Canonical, Inc. See
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
#
include("compat.inc");
if (description)
{
script_id(44039);
script_version("1.15");
script_cvs_date("Date: 2019/09/19 12:54:26");
script_cve_id("CVE-2009-1757", "CVE-2010-0012");
script_xref(name:"USN", value:"885-1");
script_name(english:"Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : transmission vulnerabilities (USN-885-1)");
script_summary(english:"Checks dpkg output for updated packages.");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Ubuntu host is missing one or more security-related
patches."
);
script_set_attribute(
attribute:"description",
value:
"It was discovered that the Transmission web interface was vulnerable
to cross-site request forgery (CSRF) attacks. If a user were tricked
into opening a specially crafted web page in a browser while
Transmission was running, an attacker could trigger commands in
Transmission. This issue affected Ubuntu 9.04. (CVE-2009-1757)
Dan Rosenberg discovered that Transmission did not properly perform
input validation when processing torrent files. If a user were tricked
into opening a crafted torrent file, an attacker could overwrite files
via directory traversal. (CVE-2010-0012).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://usn.ubuntu.com/885-1/"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_cwe_id(22, 352);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:transmission");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:transmission-cli");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:transmission-common");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:transmission-daemon");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:transmission-gtk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:transmission-qt");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.04:-:lts");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.10");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:9.04");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:9.10");
script_set_attribute(attribute:"vuln_publication_date", value:"2009/05/22");
script_set_attribute(attribute:"patch_publication_date", value:"2010/01/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/01/15");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Ubuntu Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("ubuntu.inc");
include("misc_func.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Ubuntu/release");
if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
release = chomp(release);
if (! preg(pattern:"^(8\.04|8\.10|9\.04|9\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 8.04 / 8.10 / 9.04 / 9.10", "Ubuntu " + release);
if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
flag = 0;
if (ubuntu_check(osver:"8.04", pkgname:"transmission", pkgver:"1.06-0ubuntu6.1")) flag++;
if (ubuntu_check(osver:"8.04", pkgname:"transmission-cli", pkgver:"1.06-0ubuntu6.1")) flag++;
if (ubuntu_check(osver:"8.04", pkgname:"transmission-common", pkgver:"1.06-0ubuntu6.1")) flag++;
if (ubuntu_check(osver:"8.04", pkgname:"transmission-gtk", pkgver:"1.06-0ubuntu6.1")) flag++;
if (ubuntu_check(osver:"8.10", pkgname:"transmission", pkgver:"1.34-0ubuntu2.3")) flag++;
if (ubuntu_check(osver:"8.10", pkgname:"transmission-cli", pkgver:"1.34-0ubuntu2.3")) flag++;
if (ubuntu_check(osver:"8.10", pkgname:"transmission-common", pkgver:"1.34-0ubuntu2.3")) flag++;
if (ubuntu_check(osver:"8.10", pkgname:"transmission-gtk", pkgver:"1.34-0ubuntu2.3")) flag++;
if (ubuntu_check(osver:"9.04", pkgname:"transmission", pkgver:"1.51-0ubuntu3.1")) flag++;
if (ubuntu_check(osver:"9.04", pkgname:"transmission-cli", pkgver:"1.51-0ubuntu3.1")) flag++;
if (ubuntu_check(osver:"9.04", pkgname:"transmission-common", pkgver:"1.51-0ubuntu3.1")) flag++;
if (ubuntu_check(osver:"9.04", pkgname:"transmission-daemon", pkgver:"1.51-0ubuntu3.1")) flag++;
if (ubuntu_check(osver:"9.04", pkgname:"transmission-gtk", pkgver:"1.51-0ubuntu3.1")) flag++;
if (ubuntu_check(osver:"9.10", pkgname:"transmission", pkgver:"1.75-0ubuntu2.2")) flag++;
if (ubuntu_check(osver:"9.10", pkgname:"transmission-cli", pkgver:"1.75-0ubuntu2.2")) flag++;
if (ubuntu_check(osver:"9.10", pkgname:"transmission-common", pkgver:"1.75-0ubuntu2.2")) flag++;
if (ubuntu_check(osver:"9.10", pkgname:"transmission-daemon", pkgver:"1.75-0ubuntu2.2")) flag++;
if (ubuntu_check(osver:"9.10", pkgname:"transmission-gtk", pkgver:"1.75-0ubuntu2.2")) flag++;
if (ubuntu_check(osver:"9.10", pkgname:"transmission-qt", pkgver:"1.75-0ubuntu2.2")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "transmission / transmission-cli / transmission-common / etc");
}
{"id": "UBUNTU_USN-885-1.NASL", "bulletinFamily": "scanner", "title": "Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : transmission vulnerabilities (USN-885-1)", "description": "It was discovered that the Transmission web interface was vulnerable\nto cross-site request forgery (CSRF) attacks. If a user were tricked\ninto opening a specially crafted web page in a browser while\nTransmission was running, an attacker could trigger commands in\nTransmission. This issue affected Ubuntu 9.04. (CVE-2009-1757)\n\nDan Rosenberg discovered that Transmission did not properly perform\ninput validation when processing torrent files. If a user were tricked\ninto opening a crafted torrent file, an attacker could overwrite files\nvia directory traversal. (CVE-2010-0012).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2010-01-15T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/44039", "reporter": "Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://usn.ubuntu.com/885-1/"], "cvelist": ["CVE-2009-1757", "CVE-2010-0012"], "type": "nessus", "lastseen": "2021-01-01T06:57:18", "edition": 25, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2010-0012", "CVE-2009-1757"]}, {"type": "openvas", "idList": ["OPENVAS:830827", "OPENVAS:1361412562310830828", "OPENVAS:1361412562310840369", "OPENVAS:1361412562310900715", "OPENVAS:830828", "OPENVAS:1361412562310830827", "OPENVAS:900715", "OPENVAS:66658", "OPENVAS:136141256231066658", "OPENVAS:840369"]}, {"type": "ubuntu", "idList": ["USN-885-1"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2010-014.NASL", "SUSE_11_1_TRANSMISSION-100111.NASL", "SUSE_11_2_TRANSMISSION-100111.NASL", "DEBIAN_DSA-1967.NASL", "MANDRIVA_MDVSA-2010-013.NASL", "SUSE_11_0_TRANSMISSION-100111.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:10507", "SECURITYVULNS:DOC:23020"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1967-1:AB7C1", "DEBIAN:4AF74285B39D9F2FA68E4E185C9FA24C:BC7A8"]}, {"type": "seebug", "idList": ["SSV:18930"]}, {"type": "suse", "idList": ["SUSE-SA:2010:008"]}], "modified": "2021-01-01T06:57:18", "rev": 2}, "score": {"value": 5.9, "vector": "NONE", "modified": "2021-01-01T06:57:18", "rev": 2}, "vulnersScore": 5.9}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-885-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44039);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2009-1757\", \"CVE-2010-0012\");\n script_xref(name:\"USN\", value:\"885-1\");\n\n script_name(english:\"Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : transmission vulnerabilities (USN-885-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that the Transmission web interface was vulnerable\nto cross-site request forgery (CSRF) attacks. If a user were tricked\ninto opening a specially crafted web page in a browser while\nTransmission was running, an attacker could trigger commands in\nTransmission. This issue affected Ubuntu 9.04. (CVE-2009-1757)\n\nDan Rosenberg discovered that Transmission did not properly perform\ninput validation when processing torrent files. If a user were tricked\ninto opening a crafted torrent file, an attacker could overwrite files\nvia directory traversal. (CVE-2010-0012).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/885-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(22, 352);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:transmission\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:transmission-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:transmission-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:transmission-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:transmission-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:transmission-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2009/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(8\\.04|8\\.10|9\\.04|9\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 8.04 / 8.10 / 9.04 / 9.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"8.04\", pkgname:\"transmission\", pkgver:\"1.06-0ubuntu6.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"transmission-cli\", pkgver:\"1.06-0ubuntu6.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"transmission-common\", pkgver:\"1.06-0ubuntu6.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"transmission-gtk\", pkgver:\"1.06-0ubuntu6.1\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"transmission\", pkgver:\"1.34-0ubuntu2.3\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"transmission-cli\", pkgver:\"1.34-0ubuntu2.3\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"transmission-common\", pkgver:\"1.34-0ubuntu2.3\")) flag++;\nif (ubuntu_check(osver:\"8.10\", pkgname:\"transmission-gtk\", pkgver:\"1.34-0ubuntu2.3\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"transmission\", pkgver:\"1.51-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"transmission-cli\", pkgver:\"1.51-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"transmission-common\", pkgver:\"1.51-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"transmission-daemon\", pkgver:\"1.51-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"9.04\", pkgname:\"transmission-gtk\", pkgver:\"1.51-0ubuntu3.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"transmission\", pkgver:\"1.75-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"transmission-cli\", pkgver:\"1.75-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"transmission-common\", pkgver:\"1.75-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"transmission-daemon\", pkgver:\"1.75-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"transmission-gtk\", pkgver:\"1.75-0ubuntu2.2\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"transmission-qt\", pkgver:\"1.75-0ubuntu2.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"transmission / transmission-cli / transmission-common / etc\");\n}\n", "naslFamily": "Ubuntu Local Security Checks", "pluginID": "44039", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:transmission-gtk", "p-cpe:/a:canonical:ubuntu_linux:transmission", "p-cpe:/a:canonical:ubuntu_linux:transmission-daemon", "p-cpe:/a:canonical:ubuntu_linux:transmission-qt", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "cpe:/o:canonical:ubuntu_linux:9.10", "p-cpe:/a:canonical:ubuntu_linux:transmission-common", "cpe:/o:canonical:ubuntu_linux:8.10", "cpe:/o:canonical:ubuntu_linux:9.04", "p-cpe:/a:canonical:ubuntu_linux:transmission-cli"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T11:54:13", "description": "Cross-site request forgery (CSRF) vulnerability in Transmission 1.5 before 1.53 and 1.6 before 1.61 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.", "edition": 3, "cvss3": {}, "published": "2009-05-22T11:52:00", "title": "CVE-2009-1757", "type": "cve", "cwe": ["CWE-352"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-1757"], "modified": "2009-05-22T11:52:00", "cpe": ["cpe:/a:transmissionbt:transmission:1.60", "cpe:/a:transmissionbt:transmission:1.52", "cpe:/a:transmissionbt:transmission:1.50", "cpe:/a:transmissionbt:transmission:1.51"], "id": "CVE-2009-1757", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1757", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:transmissionbt:transmission:1.60:*:*:*:*:*:*:*", "cpe:2.3:a:transmissionbt:transmission:1.51:*:*:*:*:*:*:*", "cpe:2.3:a:transmissionbt:transmission:1.52:*:*:*:*:*:*:*", "cpe:2.3:a:transmissionbt:transmission:1.50:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T11:57:21", "description": "Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file.", "edition": 3, "cvss3": {}, "published": "2010-01-08T17:30:00", "title": "CVE-2010-0012", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0012"], "modified": "2017-08-17T01:31:00", "cpe": ["cpe:/a:transmissionbt:transmission:1.76", "cpe:/a:transmissionbt:transmission:1.75", "cpe:/a:transmissionbt:transmission:1.34", "cpe:/a:transmissionbt:transmission:1.22"], "id": "CVE-2010-0012", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0012", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:transmissionbt:transmission:1.34:*:*:*:*:*:*:*", "cpe:2.3:a:transmissionbt:transmission:1.75:*:*:*:*:*:*:*", "cpe:2.3:a:transmissionbt:transmission:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:transmissionbt:transmission:1.76:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-12-04T11:18:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1757", "CVE-2010-0012"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-885-1", "modified": "2017-12-01T00:00:00", "published": "2010-01-19T00:00:00", "id": "OPENVAS:840369", "href": "http://plugins.openvas.org/nasl.php?oid=840369", "type": "openvas", "title": "Ubuntu Update for transmission vulnerabilities USN-885-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_885_1.nasl 7965 2017-12-01 07:38:25Z santu $\n#\n# Ubuntu Update for transmission vulnerabilities USN-885-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that the Transmission web interface was vulnerable to\n cross-site request forgery (CSRF) attacks. If a user were tricked into\n opening a specially crafted web page in a browser while Transmission was\n running, an attacker could trigger commands in Transmission. This issue\n affected Ubuntu 9.04. (CVE-2009-1757)\n\n Dan Rosenberg discovered that Transmission did not properly perform input\n validation when processing torrent files. If a user were tricked into\n opening a crafted torrent file, an attacker could overwrite files via\n directory traversal. (CVE-2010-0012)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-885-1\";\ntag_affected = \"transmission vulnerabilities on Ubuntu 8.04 LTS ,\n Ubuntu 8.10 ,\n Ubuntu 9.04 ,\n Ubuntu 9.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-885-1/\");\n script_id(840369);\n script_version(\"$Revision: 7965 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:38:25 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-19 08:58:46 +0100 (Tue, 19 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"885-1\");\n script_cve_id(\"CVE-2009-1757\", \"CVE-2010-0012\");\n script_name(\"Ubuntu Update for transmission vulnerabilities USN-885-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-daemon\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-daemon\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-qt\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-21T11:33:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1757", "CVE-2010-0012"], "description": "Check for the Version of transmission", "modified": "2017-12-20T00:00:00", "published": "2010-01-20T00:00:00", "id": "OPENVAS:830827", "href": "http://plugins.openvas.org/nasl.php?oid=830827", "type": "openvas", "title": "Mandriva Update for transmission MDVSA-2010:013 (transmission)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for transmission MDVSA-2010:013 (transmission)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in transmission:\n\n Cross-site request forgery (CSRF) vulnerability in Transmission 1.5\n before 1.53 and 1.6 before 1.61 allows remote attackers to hijack\n the authentication of unspecified victims via unknown vectors\n (CVE-2009-1757).\n \n Directory traversal vulnerability in libtransmission/metainfo.c in\n Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\n overwrite arbitrary files via a .. (dot dot) in a pathname within a\n .torrent file (CVE-2010-0012).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"transmission on Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-01/msg00056.php\");\n script_id(830827);\n script_version(\"$Revision: 8186 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-20 07:30:34 +0100 (Wed, 20 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-20 09:25:19 +0100 (Wed, 20 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:013\");\n script_cve_id(\"CVE-2009-1757\", \"CVE-2010-0012\");\n script_name(\"Mandriva Update for transmission MDVSA-2010:013 (transmission)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of transmission\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"transmission\", rpm:\"transmission~1.51~1.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:54:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1757", "CVE-2010-0012"], "description": "Ubuntu Update for Linux kernel vulnerabilities USN-885-1", "modified": "2017-12-26T00:00:00", "published": "2010-01-19T00:00:00", "id": "OPENVAS:1361412562310840369", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840369", "type": "openvas", "title": "Ubuntu Update for transmission vulnerabilities USN-885-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_885_1.nasl 8246 2017-12-26 07:29:20Z teissa $\n#\n# Ubuntu Update for transmission vulnerabilities USN-885-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that the Transmission web interface was vulnerable to\n cross-site request forgery (CSRF) attacks. If a user were tricked into\n opening a specially crafted web page in a browser while Transmission was\n running, an attacker could trigger commands in Transmission. This issue\n affected Ubuntu 9.04. (CVE-2009-1757)\n\n Dan Rosenberg discovered that Transmission did not properly perform input\n validation when processing torrent files. If a user were tricked into\n opening a crafted torrent file, an attacker could overwrite files via\n directory traversal. (CVE-2010-0012)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-885-1\";\ntag_affected = \"transmission vulnerabilities on Ubuntu 8.04 LTS ,\n Ubuntu 8.10 ,\n Ubuntu 9.04 ,\n Ubuntu 9.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-885-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840369\");\n script_version(\"$Revision: 8246 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-26 08:29:20 +0100 (Tue, 26 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-19 08:58:46 +0100 (Tue, 19 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"885-1\");\n script_cve_id(\"CVE-2009-1757\", \"CVE-2010-0012\");\n script_name(\"Ubuntu Update for transmission vulnerabilities USN-885-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-daemon\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.51-0ubuntu3.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.34-0ubuntu2.3\", rls:\"UBUNTU8.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.06-0ubuntu6.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-daemon\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-qt\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.75-0ubuntu2.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-18T11:05:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1757", "CVE-2010-0012"], "description": "Check for the Version of transmission", "modified": "2018-01-17T00:00:00", "published": "2010-01-20T00:00:00", "id": "OPENVAS:1361412562310830827", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830827", "type": "openvas", "title": "Mandriva Update for transmission MDVSA-2010:013 (transmission)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for transmission MDVSA-2010:013 (transmission)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in transmission:\n\n Cross-site request forgery (CSRF) vulnerability in Transmission 1.5\n before 1.53 and 1.6 before 1.61 allows remote attackers to hijack\n the authentication of unspecified victims via unknown vectors\n (CVE-2009-1757).\n \n Directory traversal vulnerability in libtransmission/metainfo.c in\n Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\n overwrite arbitrary files via a .. (dot dot) in a pathname within a\n .torrent file (CVE-2010-0012).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"transmission on Mandriva Linux 2009.1,\n Mandriva Linux 2009.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-01/msg00056.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830827\");\n script_version(\"$Revision: 8440 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 08:58:46 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-20 09:25:19 +0100 (Wed, 20 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:013\");\n script_cve_id(\"CVE-2009-1757\", \"CVE-2010-0012\");\n script_name(\"Mandriva Update for transmission MDVSA-2010:013 (transmission)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of transmission\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2009.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"transmission\", rpm:\"transmission~1.51~1.1mdv2009.1\", rls:\"MNDK_2009.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:40:17", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1757"], "description": "This host is installed with Transmission Client and is prone to\n Cross Site Request Forgery Vulnerability.", "modified": "2019-04-29T00:00:00", "published": "2009-05-29T00:00:00", "id": "OPENVAS:1361412562310900715", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900715", "type": "openvas", "title": "Transmission Client Cross Site Request Forgery Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Transmission Client Cross Site Request Forgery Vulnerability\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.900715\");\n script_version(\"2019-04-29T15:08:03+0000\");\n script_tag(name:\"last_modification\", value:\"2019-04-29 15:08:03 +0000 (Mon, 29 Apr 2019)\");\n script_tag(name:\"creation_date\", value:\"2009-05-29 07:35:11 +0200 (Fri, 29 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2009-1757\");\n script_name(\"Transmission Client Cross Site Request Forgery Vulnerability\");\n script_xref(name:\"URL\", value:\"http://www.openwall.com/lists/oss-security/2009/05/21/1\");\n\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_transmission_detect.nasl\");\n script_mandatory_keys(\"Transmission/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will let the attacker hijack the authenticated\n sessions of unspecified users.\");\n script_tag(name:\"affected\", value:\"Transmission Client version 1.5 before 1.53 and 1.6 before 1.61\");\n script_tag(name:\"insight\", value:\"This flaw is due to Cross-site request forgery error which causes hijacking\n the authentication of unspecified victims via unknown vectors.\");\n script_tag(name:\"solution\", value:\"Upgrade to version 1.53 or 1.61.\");\n script_tag(name:\"summary\", value:\"This host is installed with Transmission Client and is prone to\n Cross Site Request Forgery Vulnerability.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\ntransVer = get_kb_item(\"Transmission/Ver\");\nif(!transVer)\n exit(0);\n\nif(version_in_range(version:transVer, test_version:\"1.5\", test_version2:\"1.52\") ||\n version_in_range(version:transVer, test_version:\"1.6\", test_version2:\"1.60\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-02T21:13:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1757"], "description": "This host is installed with Transmission Client and is prone to\n Cross Site Request Forgery Vulnerability.", "modified": "2017-01-31T00:00:00", "published": "2009-05-29T00:00:00", "id": "OPENVAS:900715", "href": "http://plugins.openvas.org/nasl.php?oid=900715", "type": "openvas", "title": "Transmission Client Cross Site Request Forgery Vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_transmission_csrf_vuln.nasl 5148 2017-01-31 13:16:55Z teissa $\n#\n# Transmission Client Cross Site Request Forgery Vulnerability\n#\n# Authors:\n# Sujit Ghosal <sghosal@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will let the attacker hijack the authenticated\n sessions of unspecified users.\";\ntag_affected = \"Transmission Client version 1.5 before 1.53 and 1.6 before 1.61\";\ntag_insight = \"This flaw is due to Cross-site request forgery error which causes hijacking\n the authentication of unspecified victims via unknown vectors.\";\ntag_solution = \"Upgrade to version 1.53 or 1.61\n http://www.transmissionbt.com/download.php\";\ntag_summary = \"This host is installed with Transmission Client and is prone to\n Cross Site Request Forgery Vulnerability.\";\n\nif(description)\n{\n script_id(900715);\n script_version(\"$Revision: 5148 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-01-31 14:16:55 +0100 (Tue, 31 Jan 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-29 07:35:11 +0200 (Fri, 29 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2009-1757\");\n script_name(\"Transmission Client Cross Site Request Forgery Vulnerability\");\n script_xref(name : \"URL\" , value : \"http://www.openwall.com/lists/oss-security/2009/05/21/1\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 SecPod\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_transmission_detect.nasl\");\n script_require_keys(\"Transmission/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\ntransVer = get_kb_item(\"Transmission/Ver\");\nif(!transVer){\n exit(0);\n}\n\n# Grep for Transmission clent versions\nif(version_in_range(version:transVer, test_version:\"1.5\", test_version2:\"1.52\") ||\n version_in_range(version:transVer, test_version:\"1.6\", test_version2:\"1.60\")){\n security_message(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-18T11:04:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "description": "The remote host is missing an update to transmission\nannounced via advisory DSA 1967-1.", "modified": "2018-01-17T00:00:00", "published": "2010-01-11T00:00:00", "id": "OPENVAS:136141256231066658", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231066658", "type": "openvas", "title": "Debian Security Advisory DSA 1967-1 (transmission)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1967_1.nasl 8447 2018-01-17 16:12:19Z teissa $\n# Description: Auto-generated from advisory DSA 1967-1 (transmission)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Dan Rosenberg discovered that Transmission, a lightwight client for\nthe Bittorrent filesharing protocol performs insufficient sanitising\nof file names specified in .torrent files. This could lead to the\noverwrite of local files with the privileges of the user running\nTransmission if the user is tricked into opening a malicious torrent\nfile.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 1.22-1+lenny2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.77-1.\n\nWe recommend that you upgrade your transmission packages.\";\ntag_summary = \"The remote host is missing an update to transmission\nannounced via advisory DSA 1967-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201967-1\";\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.66658\");\n script_version(\"$Revision: 8447 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-17 17:12:19 +0100 (Wed, 17 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-11 23:48:26 +0100 (Mon, 11 Jan 2010)\");\n script_cve_id(\"CVE-2010-0012\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1967-1 (transmission)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-06T13:05:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "description": "Check for the Version of transmission", "modified": "2018-01-04T00:00:00", "published": "2010-01-20T00:00:00", "id": "OPENVAS:1361412562310830828", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830828", "type": "openvas", "title": "Mandriva Update for transmission MDVSA-2010:014 (transmission)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for transmission MDVSA-2010:014 (transmission)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been found and corrected in transmission:\n\n Directory traversal vulnerability in libtransmission/metainfo.c in\n Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\n overwrite arbitrary files via a .. (dot dot) in a pathname within a\n .torrent file (CVE-2010-0012).\n \n The updated packages have been patched to correct this issue.\";\n\ntag_affected = \"transmission on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-01/msg00057.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830828\");\n script_version(\"$Revision: 8287 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-04 08:28:11 +0100 (Thu, 04 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-20 09:25:19 +0100 (Wed, 20 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:014\");\n script_cve_id(\"CVE-2010-0012\");\n script_name(\"Mandriva Update for transmission MDVSA-2010:014 (transmission)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of transmission\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"transmission-cli\", rpm:\"transmission-cli~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-common\", rpm:\"transmission-common~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-daemon\", rpm:\"transmission-daemon~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-gtk\", rpm:\"transmission-gtk~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-qt4\", rpm:\"transmission-qt4~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission\", rpm:\"transmission~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "description": "The remote host is missing an update to transmission\nannounced via advisory DSA 1967-1.", "modified": "2017-07-07T00:00:00", "published": "2010-01-11T00:00:00", "id": "OPENVAS:66658", "href": "http://plugins.openvas.org/nasl.php?oid=66658", "type": "openvas", "title": "Debian Security Advisory DSA 1967-1 (transmission)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1967_1.nasl 6614 2017-07-07 12:09:12Z cfischer $\n# Description: Auto-generated from advisory DSA 1967-1 (transmission)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Dan Rosenberg discovered that Transmission, a lightwight client for\nthe Bittorrent filesharing protocol performs insufficient sanitising\nof file names specified in .torrent files. This could lead to the\noverwrite of local files with the privileges of the user running\nTransmission if the user is tricked into opening a malicious torrent\nfile.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 1.22-1+lenny2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.77-1.\n\nWe recommend that you upgrade your transmission packages.\";\ntag_summary = \"The remote host is missing an update to transmission\nannounced via advisory DSA 1967-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201967-1\";\n\n\nif(description)\n{\n script_id(66658);\n script_version(\"$Revision: 6614 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:09:12 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-11 23:48:26 +0100 (Mon, 11 Jan 2010)\");\n script_cve_id(\"CVE-2010-0012\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1967-1 (transmission)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"transmission\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"transmission-common\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"transmission-cli\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"transmission-gtk\", ver:\"1.22-1+lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-15T11:58:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "description": "Check for the Version of transmission", "modified": "2017-12-15T00:00:00", "published": "2010-01-20T00:00:00", "id": "OPENVAS:830828", "href": "http://plugins.openvas.org/nasl.php?oid=830828", "type": "openvas", "title": "Mandriva Update for transmission MDVSA-2010:014 (transmission)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for transmission MDVSA-2010:014 (transmission)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been found and corrected in transmission:\n\n Directory traversal vulnerability in libtransmission/metainfo.c in\n Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\n overwrite arbitrary files via a .. (dot dot) in a pathname within a\n .torrent file (CVE-2010-0012).\n \n The updated packages have been patched to correct this issue.\";\n\ntag_affected = \"transmission on Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2010-01/msg00057.php\");\n script_id(830828);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-01-20 09:25:19 +0100 (Wed, 20 Jan 2010)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDVSA\", value: \"2010:014\");\n script_cve_id(\"CVE-2010-0012\");\n script_name(\"Mandriva Update for transmission MDVSA-2010:014 (transmission)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of transmission\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"transmission-cli\", rpm:\"transmission-cli~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-common\", rpm:\"transmission-common~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-daemon\", rpm:\"transmission-daemon~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-gtk\", rpm:\"transmission-gtk~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission-qt4\", rpm:\"transmission-qt4~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"transmission\", rpm:\"transmission~1.75~1.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2020-07-09T00:34:48", "bulletinFamily": "unix", "cvelist": ["CVE-2009-1757", "CVE-2010-0012"], "description": "It was discovered that the Transmission web interface was vulnerable to \ncross-site request forgery (CSRF) attacks. If a user were tricked into \nopening a specially crafted web page in a browser while Transmission was \nrunning, an attacker could trigger commands in Transmission. This issue \naffected Ubuntu 9.04. (CVE-2009-1757)\n\nDan Rosenberg discovered that Transmission did not properly perform input \nvalidation when processing torrent files. If a user were tricked into \nopening a crafted torrent file, an attacker could overwrite files via \ndirectory traversal. (CVE-2010-0012)", "edition": 5, "modified": "2010-01-18T00:00:00", "published": "2010-01-18T00:00:00", "id": "USN-885-1", "href": "https://ubuntu.com/security/notices/USN-885-1", "title": "Transmission vulnerabilities", "type": "ubuntu", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-01-07T11:52:32", "description": "Multiple vulnerabilities has been found and corrected in \ntransmission :\n\nCross-site request forgery (CSRF) vulnerability in Transmission 1.5\nbefore 1.53 and 1.6 before 1.61 allows remote attackers to hijack the\nauthentication of unspecified victims via unknown vectors\n(CVE-2009-1757).\n\nDirectory traversal vulnerability in libtransmission/metainfo.c in\nTransmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\noverwrite arbitrary files via a .. (dot dot) in a pathname within a\n.torrent file (CVE-2010-0012).\n\nThe updated packages have been patched to correct these issues.", "edition": 25, "published": "2010-07-30T00:00:00", "title": "Mandriva Linux Security Advisory : transmission (MDVSA-2010:013)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-1757", "CVE-2010-0012"], "modified": "2010-07-30T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2009.1", "p-cpe:/a:mandriva:linux:transmission"], "id": "MANDRIVA_MDVSA-2010-013.NASL", "href": "https://www.tenable.com/plugins/nessus/48167", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2010:013. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48167);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-1757\", \"CVE-2010-0012\");\n script_xref(name:\"MDVSA\", value:\"2010:013\");\n\n script_name(english:\"Mandriva Linux Security Advisory : transmission (MDVSA-2010:013)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandriva Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been found and corrected in \ntransmission :\n\nCross-site request forgery (CSRF) vulnerability in Transmission 1.5\nbefore 1.53 and 1.6 before 1.61 allows remote attackers to hijack the\nauthentication of unspecified victims via unknown vectors\n(CVE-2009-1757).\n\nDirectory traversal vulnerability in libtransmission/metainfo.c in\nTransmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\noverwrite arbitrary files via a .. (dot dot) in a pathname within a\n.torrent file (CVE-2010-0012).\n\nThe updated packages have been patched to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected transmission package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(22, 352);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:transmission\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.1\", reference:\"transmission-1.51-1.1mdv2009.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T05:53:03", "description": "Specially crafted torrent files could overwrite arbitrary files.", "edition": 20, "published": "2010-01-22T00:00:00", "title": "openSUSE Security Update : transmission (transmission-1777)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:transmission", "cpe:/o:novell:opensuse:11.1", "p-cpe:/a:novell:opensuse:transmission-gtk", "p-cpe:/a:novell:opensuse:transmission-lang"], "id": "SUSE_11_1_TRANSMISSION-100111.NASL", "href": "https://www.tenable.com/plugins/nessus/44113", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update transmission-1777.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44113);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/10/25 13:36:38\");\n\n script_cve_id(\"CVE-2010-0012\");\n\n script_name(english:\"openSUSE Security Update : transmission (transmission-1777)\");\n script_summary(english:\"Check for the transmission-1777 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\"Specially crafted torrent files could overwrite arbitrary files.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=568228\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected transmission packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(22);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"transmission-1.34-1.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"transmission-gtk-1.34-1.32.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"transmission-lang-1.34-1.32.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"transmission / transmission-gtk / transmission-lang\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T05:54:29", "description": "Specially crafted torrent files could overwrite arbitrary files.", "edition": 20, "published": "2010-01-22T00:00:00", "title": "openSUSE Security Update : transmission (transmission-1777)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:transmission", "p-cpe:/a:novell:opensuse:transmission-common", "p-cpe:/a:novell:opensuse:transmission-common-lang", "p-cpe:/a:novell:opensuse:transmission-gtk", "cpe:/o:novell:opensuse:11.2", "p-cpe:/a:novell:opensuse:transmission-qt"], "id": "SUSE_11_2_TRANSMISSION-100111.NASL", "href": "https://www.tenable.com/plugins/nessus/44114", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update transmission-1777.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44114);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/10/25 13:36:39\");\n\n script_cve_id(\"CVE-2010-0012\");\n\n script_name(english:\"openSUSE Security Update : transmission (transmission-1777)\");\n script_summary(english:\"Check for the transmission-1777 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\"Specially crafted torrent files could overwrite arbitrary files.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=568228\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected transmission packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(22);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-common-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"transmission-1.74-4.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"transmission-common-1.74-4.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"transmission-common-lang-1.74-4.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"transmission-gtk-1.74-4.7.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"transmission-qt-1.74-4.7.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"transmission / transmission-common / transmission-common-lang / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T05:51:45", "description": "Specially crafted torrent files could overwrite arbitrary files.", "edition": 20, "published": "2010-01-22T00:00:00", "title": "openSUSE Security Update : transmission (transmission-1777)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:transmission", "cpe:/o:novell:opensuse:11.0", "p-cpe:/a:novell:opensuse:transmission-gtk", "p-cpe:/a:novell:opensuse:transmission-lang"], "id": "SUSE_11_0_TRANSMISSION-100111.NASL", "href": "https://www.tenable.com/plugins/nessus/44112", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update transmission-1777.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44112);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/10/25 13:36:37\");\n\n script_cve_id(\"CVE-2010-0012\");\n\n script_name(english:\"openSUSE Security Update : transmission (transmission-1777)\");\n script_summary(english:\"Check for the transmission-1777 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\"Specially crafted torrent files could overwrite arbitrary files.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=568228\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected transmission packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(22);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:transmission-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"transmission-1.11-18.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"transmission-gtk-1.11-18.2\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"transmission-lang-1.11-18.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"transmission / transmission-gtk / transmission-lang\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T09:45:49", "description": "Dan Rosenberg discovered that Transmission, a lightwight client for\nthe Bittorrent filesharing protocol, performs insufficient sanitising\nof file names specified in .torrent files. This could lead to the\noverwrite of local files with the privileges of the user running\nTransmission if the user is tricked into opening a malicious torrent\nfile.", "edition": 26, "published": "2010-02-24T00:00:00", "title": "Debian DSA-1967-1 : transmission - directory traversal", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "modified": "2010-02-24T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:transmission", "cpe:/o:debian:debian_linux:5.0"], "id": "DEBIAN_DSA-1967.NASL", "href": "https://www.tenable.com/plugins/nessus/44832", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1967. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(44832);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-0012\");\n script_xref(name:\"DSA\", value:\"1967\");\n\n script_name(english:\"Debian DSA-1967-1 : transmission - directory traversal\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Dan Rosenberg discovered that Transmission, a lightwight client for\nthe Bittorrent filesharing protocol, performs insufficient sanitising\nof file names specified in .torrent files. This could lead to the\noverwrite of local files with the privileges of the user running\nTransmission if the user is tricked into opening a malicious torrent\nfile.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2010/dsa-1967\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the transmission packages.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 1.22-1+lenny2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(22);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:transmission\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"5.0\", prefix:\"transmission\", reference:\"1.22-1+lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"transmission-cli\", reference:\"1.22-1+lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"transmission-common\", reference:\"1.22-1+lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"transmission-gtk\", reference:\"1.22-1+lenny2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T11:52:32", "description": "A vulnerability has been found and corrected in transmission :\n\nDirectory traversal vulnerability in libtransmission/metainfo.c in\nTransmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\noverwrite arbitrary files via a .. (dot dot) in a pathname within a\n.torrent file (CVE-2010-0012).\n\nThe updated packages have been patched to correct this issue.", "edition": 24, "published": "2010-07-30T00:00:00", "title": "Mandriva Linux Security Advisory : transmission (MDVSA-2010:014)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2010-0012"], "modified": "2010-07-30T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:transmission-gtk", "p-cpe:/a:mandriva:linux:transmission-daemon", "p-cpe:/a:mandriva:linux:transmission-common", "cpe:/o:mandriva:linux:2010.0", "p-cpe:/a:mandriva:linux:transmission-qt4", "p-cpe:/a:mandriva:linux:transmission-cli"], "id": "MANDRIVA_MDVSA-2010-014.NASL", "href": "https://www.tenable.com/plugins/nessus/48168", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2010:014. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(48168);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-0012\");\n script_xref(name:\"MDVSA\", value:\"2010:014\");\n\n script_name(english:\"Mandriva Linux Security Advisory : transmission (MDVSA-2010:014)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been found and corrected in transmission :\n\nDirectory traversal vulnerability in libtransmission/metainfo.c in\nTransmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to\noverwrite arbitrary files via a .. (dot dot) in a pathname within a\n.torrent file (CVE-2010-0012).\n\nThe updated packages have been patched to correct this issue.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_cwe_id(22);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:transmission-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:transmission-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:transmission-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:transmission-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:transmission-qt4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2010.0\", reference:\"transmission-cli-1.75-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"transmission-common-1.75-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"transmission-daemon-1.75-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"transmission-gtk-1.75-1.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"transmission-qt4-1.75-1.1mdv2010.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:35", "bulletinFamily": "software", "cvelist": ["CVE-2010-0012"], "description": "Directory traversal via .torrent files.", "edition": 1, "modified": "2010-01-08T00:00:00", "published": "2010-01-08T00:00:00", "id": "SECURITYVULNS:VULN:10507", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10507", "title": "Transmission bittorent client directory traversal", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:32", "bulletinFamily": "software", "cvelist": ["CVE-2010-0012"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ------------------------------------------------------------------------\r\nDebian Security Advisory DSA-1967-q security@debian.org\r\nhttp://www.debian.org/security/ Moritz Muehlenhoff\r\nJanuary 07, 2010 http://www.debian.org/security/faq\r\n- ------------------------------------------------------------------------\r\n\r\nPackage : transmission\r\nVulnerability : directory traversal\r\nProblem type : local(remote)\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2010-0012\r\n\r\nDan Rosenberg discovered that Transmission, a lightwight client for\r\nthe Bittorrent filesharing protocol performs insufficient sanitising\r\nof file names specified in .torrent files. This could lead to the\r\noverwrite of local files with the privileges of the user running\r\nTransmission if the user is tricked into opening a malicious torrent\r\nfile.\r\n\r\nFor the stable distribution (lenny), this problem has been fixed in\r\nversion 1.22-1+lenny2.\r\n\r\nFor the unstable distribution (sid), this problem has been fixed in\r\nversion 1.77-1.\r\n\r\nWe recommend that you upgrade your transmission packages.\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\n\r\nDebian GNU/Linux 5.0 alias lenny\r\n- --------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2.diff.gz\r\n Size/MD5 checksum: 11339 ab8089177ea598bae94487142efb7c32\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22.orig.tar.gz\r\n Size/MD5 checksum: 4931481 fcb56a527db138cfbe83e9cf7ed16179\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2.dsc\r\n Size/MD5 checksum: 1481 9202a190563dc229b3297d9748692e66\r\n\r\nArchitecture independent packages:\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2_all.deb\r\n Size/MD5 checksum: 860 a61eae34864fe101ed5c2ec8a3511411\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-common_1.22-1+lenny2_all.deb\r\n Size/MD5 checksum: 14854 7da6a8e90ea5ece48503cc2b6d5324b8\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_alpha.deb\r\n Size/MD5 checksum: 635620 03d3801c2313261d2f578c0a3b06db1a\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_alpha.deb\r\n Size/MD5 checksum: 493178 10bfd690bf97902a1ce556ff568c9161\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_amd64.deb\r\n Size/MD5 checksum: 526544 60fdd255828b74bfc5bf88e469924c7e\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_amd64.deb\r\n Size/MD5 checksum: 448664 da7f9bcffbb9f628b604d1f8421348cf\r\n\r\narm architecture (ARM)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_arm.deb\r\n Size/MD5 checksum: 489984 1d3a15a43977376100420f4ebab67b13\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_arm.deb\r\n Size/MD5 checksum: 424216 243ef4d6906701651cf12bf79fe2e682\r\n\r\narmel architecture (ARM EABI)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_armel.deb\r\n Size/MD5 checksum: 494624 87b5b59f5333471975ba277c37c30409\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_armel.deb\r\n Size/MD5 checksum: 423284 a2470ec71ae32eb102bdb32d4043b40a\r\n\r\nhppa architecture (HP PA RISC)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_hppa.deb\r\n Size/MD5 checksum: 585786 eb020bdf5c04a602bac0c5d4a96f1712\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_hppa.deb\r\n Size/MD5 checksum: 472772 061acf64ccd9332c01e8d4b56fc719b4\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_i386.deb\r\n Size/MD5 checksum: 480444 7d894d2e5dce801403fb1fb0385e9dce\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_i386.deb\r\n Size/MD5 checksum: 430638 09debafd690dd13fcf9b00d88e683667\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_ia64.deb\r\n Size/MD5 checksum: 873890 d09cdaa9330d8fd5935b483142cff1bf\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_ia64.deb\r\n Size/MD5 checksum: 598356 47d67a8a3cb1eaf311f315e02c94787f\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_mipsel.deb\r\n Size/MD5 checksum: 602890 6f77c487b8cf7f246afe29997bf49768\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_mipsel.deb\r\n Size/MD5 checksum: 459878 9a20d17dde7469a1692bed53c69df681\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_powerpc.deb\r\n Size/MD5 checksum: 474194 3f884a72b8dae2c55b34b0718152c7ac\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_powerpc.deb\r\n Size/MD5 checksum: 579190 b9f6ad93935c1d9fc8b8a518b772eb9a\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_s390.deb\r\n Size/MD5 checksum: 551442 760fb4b9f138aad71d77b0ca67c26e78\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_s390.deb\r\n Size/MD5 checksum: 465012 cd3ce00407b78d8e239f63a3598e3462\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_sparc.deb\r\n Size/MD5 checksum: 430260 c67e263523811a0af5f059da732b6775\r\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_sparc.deb\r\n Size/MD5 checksum: 465490 8b181731bfa4e815f63880f5a8195f68\r\n\r\n\r\n These files will probably be moved into the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n\r\niEYEARECAAYFAktGOKsACgkQXm3vHE4uyloMnACgyDf7J2vELG6J+p76Evkl/V76\r\njx0AnAkeSJ6e/qRFDbsU8hBG7LbdF9zI\r\n=+0ZG\r\n-----END PGP SIGNATURE-----", "edition": 1, "modified": "2010-01-08T00:00:00", "published": "2010-01-08T00:00:00", "id": "SECURITYVULNS:DOC:23020", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:23020", "title": "[SECURITY] [DSA 1967-1] New transmission packages fix directory traversal", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "debian": [{"lastseen": "2020-11-11T13:20:16", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0012"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1967-q security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 07, 2010 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : transmission\nVulnerability : directory traversal\nProblem type : local(remote)\nDebian-specific: no\nCVE Id(s) : CVE-2010-0012\n\nDan Rosenberg discovered that Transmission, a lightwight client for\nthe Bittorrent filesharing protocol performs insufficient sanitising\nof file names specified in .torrent files. This could lead to the\noverwrite of local files with the privileges of the user running\nTransmission if the user is tricked into opening a malicious torrent\nfile.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 1.22-1+lenny2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.77-1.\n\nWe recommend that you upgrade your transmission packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2.diff.gz\n Size/MD5 checksum: 11339 ab8089177ea598bae94487142efb7c32\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22.orig.tar.gz\n Size/MD5 checksum: 4931481 fcb56a527db138cfbe83e9cf7ed16179\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2.dsc\n Size/MD5 checksum: 1481 9202a190563dc229b3297d9748692e66\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2_all.deb\n Size/MD5 checksum: 860 a61eae34864fe101ed5c2ec8a3511411\n http://security.debian.org/pool/updates/main/t/transmission/transmission-common_1.22-1+lenny2_all.deb\n Size/MD5 checksum: 14854 7da6a8e90ea5ece48503cc2b6d5324b8\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_alpha.deb\n Size/MD5 checksum: 635620 03d3801c2313261d2f578c0a3b06db1a\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_alpha.deb\n Size/MD5 checksum: 493178 10bfd690bf97902a1ce556ff568c9161\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_amd64.deb\n Size/MD5 checksum: 526544 60fdd255828b74bfc5bf88e469924c7e\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_amd64.deb\n Size/MD5 checksum: 448664 da7f9bcffbb9f628b604d1f8421348cf\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_arm.deb\n Size/MD5 checksum: 489984 1d3a15a43977376100420f4ebab67b13\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_arm.deb\n Size/MD5 checksum: 424216 243ef4d6906701651cf12bf79fe2e682\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_armel.deb\n Size/MD5 checksum: 494624 87b5b59f5333471975ba277c37c30409\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_armel.deb\n Size/MD5 checksum: 423284 a2470ec71ae32eb102bdb32d4043b40a\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_hppa.deb\n Size/MD5 checksum: 585786 eb020bdf5c04a602bac0c5d4a96f1712\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_hppa.deb\n Size/MD5 checksum: 472772 061acf64ccd9332c01e8d4b56fc719b4\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_i386.deb\n Size/MD5 checksum: 480444 7d894d2e5dce801403fb1fb0385e9dce\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_i386.deb\n Size/MD5 checksum: 430638 09debafd690dd13fcf9b00d88e683667\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_ia64.deb\n Size/MD5 checksum: 873890 d09cdaa9330d8fd5935b483142cff1bf\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_ia64.deb\n Size/MD5 checksum: 598356 47d67a8a3cb1eaf311f315e02c94787f\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_mipsel.deb\n Size/MD5 checksum: 602890 6f77c487b8cf7f246afe29997bf49768\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_mipsel.deb\n Size/MD5 checksum: 459878 9a20d17dde7469a1692bed53c69df681\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_powerpc.deb\n Size/MD5 checksum: 474194 3f884a72b8dae2c55b34b0718152c7ac\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_powerpc.deb\n Size/MD5 checksum: 579190 b9f6ad93935c1d9fc8b8a518b772eb9a\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_s390.deb\n Size/MD5 checksum: 551442 760fb4b9f138aad71d77b0ca67c26e78\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_s390.deb\n Size/MD5 checksum: 465012 cd3ce00407b78d8e239f63a3598e3462\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/t/transmission/transmission-gtk_1.22-1+lenny2_sparc.deb\n Size/MD5 checksum: 430260 c67e263523811a0af5f059da732b6775\n http://security.debian.org/pool/updates/main/t/transmission/transmission-cli_1.22-1+lenny2_sparc.deb\n Size/MD5 checksum: 465490 8b181731bfa4e815f63880f5a8195f68\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2010-01-07T19:42:23", "published": "2010-01-07T19:42:23", "id": "DEBIAN:DSA-1967-1:AB7C1", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2010/msg00002.html", "title": "[SECURITY] [DSA 1967-1] New transmission packages fix directory traversal", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-11T13:11:49", "bulletinFamily": "unix", "cvelist": ["CVE-2010-0012"], "description": "Leo Costela and Josselin Mouette uploaded new packages for transmission\nwhich fixed the following security problem:\n\nCVE-2010-0012\nDSA-1967-1\n\n Dan Rosenberg discovered that Transmission, a lightweight client\n for\n the Bittorrent filesharing protocol performs insufficient\n sanitizing\n of file names specified in .torrent files. This could lead to\n the\n overwrite of local files with the privileges of the user running\n Transmission if the user is tricked into opening a malicious\n torrent\n file.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 1.22-1+lenny2.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.77-1.\n\nFor the lenny-backports distribution the problems have been fixed in\nversion 1.77-1~bpo50+1.\n\nUpgrade instructions\n--------------------\n\nIf you don't use pinning (see [1]) you have to update the package\nmanually via "apt-get -t lenny-backports install <packagelist>" with\nthe packagelist of your installed packages affected by this update.\n[1] <http://backports.org/dokuwiki/doku.php?id=instructions>\n\nWe recommend to pin the backports repository to 200 so that new\nversions of installed backports will be installed automatically. \n\n Package: *\n Pin: release a=lenny-backports\n Pin-Priority: 200\n\n-- \n .''`. Josselin Mouette\n: :' :\n`. `' \u201cI recommend you to learn English in hope that you in\n `- future understand things\u201d -- J\u00f6rg Schilling\n", "edition": 3, "modified": "2010-01-30T18:51:29", "published": "2010-01-30T18:51:29", "id": "DEBIAN:4AF74285B39D9F2FA68E4E185C9FA24C:BC7A8", "href": "https://lists.debian.org/debian-backports-announce/2010/debian-backports-announce-201001/msg00005.html", "title": "[Backports-security-announce] Security update for transmission", "type": "debian", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "seebug": [{"lastseen": "2017-11-19T18:16:20", "description": "Bugraq ID: 37659\r\nCVE ID\uff1aCVE-2010-0012\r\n\r\nTransmission\u662f\u4e00\u6b3e*nix\u4e0b\u7684BT\u4e0b\u8f7d\u8f6f\u4ef6\u3002\r\nTransmission\u5728\u4fdd\u5b58\u6587\u4ef6\u524d\u5e94\u7528\u7a0b\u5e8f\u4e0d\u6b63\u786e\u8fc7\u6ee4"name"\u5173\u952e\u8bcd\uff0c\u653b\u51fb\u8005\u6784\u5efa\u4e00\u4e2a\u5728"name"\u5173\u952e\u8bcd\u4e2d\u5305\u542b"../"\u76ee\u5f55\u904d\u5386\u5e8f\u5217\u7684.torrent\u6587\u4ef6\uff0c\u8bf1\u4f7f\u7528\u6237\u6253\u5f00\uff0c\u53ef\u8986\u76d6\u672c\u5730\u7cfb\u7edf\u4e2d\u7684\u4efb\u610f\u6587\u4ef6\u3002\n\nTransmission Project Transmission 1.76\r\nTransmission Project Transmission 1.50\r\nTransmission Project Transmission 1.41\nTransmission 1.77\u5df2\u7ecf\u4fee\u590d\u6b64\u6f0f\u6d1e\uff0c\u5efa\u8bae\u7528\u6237\u4e0b\u8f7d\u4f7f\u7528\uff1a\r\nhttp://www.transmissionbt.com/", "published": "2010-01-12T00:00:00", "title": "Transmission\u4efb\u610f\u6587\u4ef6\u8986\u76d6\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-0012"], "modified": "2010-01-12T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-18930", "id": "SSV:18930", "sourceData": "\n http://launchpadlibrarian.net/37213548/EVIL.torrent\n ", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-18930"}], "suse": [{"lastseen": "2016-09-04T12:21:59", "bulletinFamily": "unix", "cvelist": ["CVE-2009-3953", "CVE-2009-3959", "CVE-2009-3955", "CVE-2009-4355", "CVE-2009-3957", "CVE-2009-3958", "CVE-2010-0001", "CVE-2009-4324", "CVE-2010-0290", "CVE-2009-3954", "CVE-2009-3956", "CVE-2010-0004", "CVE-2010-0097", "CVE-2010-0005", "CVE-2009-4022", "CVE-2009-2624", "CVE-2010-0012"], "description": "Specially crafted PDF files could crash acroread. Attackers could potentially exploit that to execute arbitrary code (CVE-2009-3953, CVE-2009-3954, CVE-2009-3955, CVE-2009-3956, CVE-2009-3957, CVE-2009-3958, CVE-2009-3959, CVE-2009-4324). Acrobat reader was updated to version 9.3 to fix the security issues. Note: Due to integration issues with the major version update of acroread on SLE10 updates for SLE10 are not ready yet. Fixed packages will be submitted ASAP.\n#### Solution\nThere is no known workaround, please install the update packages.", "edition": 1, "modified": "2010-01-26T16:40:23", "published": "2010-01-26T16:40:23", "id": "SUSE-SA:2010:008", "href": "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html", "type": "suse", "title": "remote code execution in acroread", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}